نتایج جستجو برای: spying operation

تعداد نتایج: 211944  

Journal: :IEEE Security & Privacy 2014
Gary McGraw

7 M atthew Green, an assistant research professor at the Johns Hopkins Information Security Institute, talks about the difference between theoretical and applied cryptography, blogs, and back doors. You've spent a lot of time straddling the gap between academia and the corporate world. Can you explain the difference between theoretical and applied cryptography? It turns out, and I was surprised...

Journal: :iranian journal of allergy, asthma and immunology 0
seyed hessamedin nabavizadeh 1department of pediatrics allergy and immunology, yasuj university of medical sciences, iran amir anushiravani department of pediatrics, nemazee hospital, shiraz university of medical sciences, shiraz, iran reza amin department of pediatrics allergy and immunology, shiraz university of medical sciences, iran

hypersensitivity reactions to natural rubber latex have increased recently, especially among people with high exposure to latex allergens. hypersensitivity reactions to latex are related to many conditions like occupational asthma. our study was performed to determine the prevalence of hypersensitivity to natural rubber latex and potential food cross reactions in operation room personnel in shi...

Journal: :Border Crossings: The Journal of Japanese-Language Literature Studies 2019

Journal: :The British Journal of Politics and International Relations 2021

From its inception in 2015, the Prevent Duty has required educators, and other members of social sector, to exercise ‘due regard’ preventing pupils from being drawn into terrorism, irrespective age child. This article explores how primary educators have understood implemented this preventative security policy their schools. Analysis is based on a survey 345 school 37 semi-structured interviews ...

Journal: :Global journal of computer science and technology 2022

Due to a rapid development in the field of information and communication, technologies yielded novel changes both individual organizational operations. Therefore, accessibility became easier more convenient than before, malicious approaches such as hacking or spying aimed at various kept increasing. With aim preventing approaches, classification detecting traffic are vital. our research utilize...

Journal: :Public governance, administration and finances law review 2021

Over the centuries, new forms of surveillance technology have emerged. At founding U.S., government did not sophisticated spying and technologies at its disposal. In eighteenth century, police might tried to eavesdrop on their fellow citizens in taverns or other public settings, they listened outside a suspect’s window. However, without advanced that exist today, opportunities for successful ea...

Journal: :seminar.net 2021

This paper presents a feminist critique to digital consent and argues that the current system is flawed. The online surveillance adtech industry funds web had use mechanism commodifies people, rendering their behaviors into data - products can be sold traded for highest bidder. was made possible by objectifying, dehumanizing decontextualizing human engagement identity measurable quantifiable un...

Journal: :world journal of plastic surgery 0
abdoljalil kalantar hormozi department of craniomaxillofacial surgery, mofid hospital, shahid beheshti university of medical sciences, tehran, iran nastaran mahdavi department of pediatric anaesthesiology, mofid hospital, shahid beheshti university of medical sciences, tehran, iran mohammad mehdi foroozanfar department of pediatric anaesthesiology, mofid hospital, shahid beheshti university of medical sciences, tehran, iran seyed sajad razavi department of pediatric anaesthesiology, mofid hospital, shahid beheshti university of medical sciences, tehran, iran seyed amir mohajerani department of pediatric anaesthesiology, mofid hospital, shahid beheshti university of medical sciences, tehran, iran ahmad eghbali department of pediatric anaesthesiology, mofid hospital, shahid beheshti university of medical sciences, tehran, iran

background craniosynostosis results from premature closure of one or more cranial sutures, leading to deformed calvaria and craniofacial skeleton at birth. postoperative complications and outcome in intensive care unit (icu) is related to surgical method and perioperative management. this study determined the perioperative risk factors, which affect outcome of patients after craniosynostosis su...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید